Help
RSS
API
Feed
Maltego
Contact
Domain > english.ida.dk
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2025-01-23
93.176.121.159
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyContent-Type: text/html; charsetUTF-8Location: https://english.ida.dk/Server: Microsoft-IIS/10.0X-Powered-By: ASP.NETDate: Mon, 09 Sep 2024 10:10:47 GMTContent-Length: 14 head>title>Document Moved/title>/head>body>h1>Object Moved/h1>This document may be found a HREFhttps://english.ida.dk/>here/a>/body>
Port 443
HTTP/1.1 200 OKCache-Control: privateContent-Type: text/html; charsetutf-8Request-Context: appIdcid-v1:7487d1af-3082-4ebe-8ed0-ee5896bc4cd5Access-Control-Expose-Headers: Request-ContextDate: Mon, 09 S !DOCTYPE html> html langen dirltr> head> !-- Google Tag Manager The dataLayer is very ugly as search page are implemented in a different way than all content pages that are implemented different than the front page. --> script> window.dataLayer window.dataLayer || ; window.dataLayer window.dataLayer.concat({event:trackPageview,loginStatus:logget ud,sideTitel:forside,sideId:1061,sideSection:english}); (function (w, d, s, l, i) { wl wl || ; wl.push({ gtm.start: new Date().getTime(), event: gtm.js }); var f d.getElementsByTagName(s)0, j d.createElement(s), dl l ! dataLayer ? &l + l : ; j.async true; j.src https://www.googletagmanager.com/gtm.js?id + i + dl; f.parentNode.insertBefore(j, f); })(window, document, script, dataLayer, GTM-KQHXHQG); /script> !-- End Google Tag Manager --> script idCookieConsent srchttps://policy.app.cookieinformation.com/uc.js data-cultureEN typetext/javascript>/script> script typetext/javascript> !function (T, l, y) { var S T.location, k script, D instrumentationKey, C ingestionendpoint, I disableExceptionTracking, E ai.device., b toLowerCase, w crossOrigin, N POST, e appInsightsSDK, t y.name || appInsights; (y.name || Te) && (Te t); var n Tt || function (d) { var g !1, f !1, m { initialize: !0, queue: , sv: 5, version: 2, config: d }; function v(e, t) { var n {}, a Browser; return nE + id ab(), nE + type a, nai.operation.name S && S.pathname || _unknown_, nai.internal.sdkVersion javascript:snippet_ + (m.sv || m.version), { time: function () { var e new Date; function t(e) { var t + e; return 1 t.length && (t 0 + t), t } return e.getUTCFullYear() + - + t(1 + e.getUTCMonth()) + - + t(e.getUTCDate()) + T + t(e.getUTCHours()) + : + t(e.getUTCMinutes()) + : + t(e.getUTCSeconds()) + . + ((e.getUTCMilliseconds() / 1e3).toFixed(3) + ).slice(2, 5)
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]